OneDrive Off A Cliff

Frustrated young man sitting on staircase working with laptop. U

In my last blog, I posted about the value of implementing two-factor authentication (2FA) as a significant enhancement to the security of the traditional username/password authentication method.  The availability of free authentication applications like Google Authenticator, Authy, and FreeOTP (there are many more), and the ever growing list of public websites that now support these … Read more

Security Training Awareness: Create A Plan and Track Effectiveness

email security on laptop

As robust as your organization’s security program, policies, and toolsets are, there is still one vulnerability that even the most secure IT department cannot control – your employees. Cybercriminals rely on the fact that many employees are inadequately trained and underestimate the risks of phishing scams and ransomware.  With over 53,000 security incidents and more … Read more

Top 10 Things We Can Learn from the Target Breach

cyber-security

For those of you not familiar with the SANS Institute http://www.sans.org, the SANS Institute was established in 1989 as a cooperative IT security research and education organization that today reaches more than 165,000 security professionals around the world.  It is a tremendous resource for everything related to IT security, and I highly encourage any organization or individual … Read more

The Legendary Router Malware

router and cables

When diagnosing your computer’s security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved … Read more

Take Care of Your Computer and it Will Take Care of You

computer maintenance service repair

When it comes to owning anything expensive, it’s important to practice proper maintenance. One of the most basic things you can do to take better care of your computer is to periodically examine the software on your computer. Although software maintenance can be challenging at times, it can be incredibly rewarding. It doesn’t have to … Read more

Internet Explorer 8 Zero-Day Vulnerability Found, but Not Patched

virus network icon

With the world still on edge about the recent vulnerability found in most versions of Internet Explorer, another one has been discovered, this time in Internet Explorer 8. This bug allows a hacker to execute malicious code when a user opens an infected email or webpage. However, this vulnerability is different than the one previously … Read more

Urgent: Protect Yourself Against Heartbleed

heartbleed bug icon

April 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, … Read more

Cloud Safety Presents New Options for Businesses

cloud security icon

Admit it, you’ve thought about moving some of your computing infrastructure to the cloud, but just couldn’t take the leap because there is a perception out there that suggests cloud-based computing systems are less secure than the ones that you house within the confines of your office. The fact of the matter is that every piece of computing infrastructure … Read more

Are There Hackers Listening to You?

hacker face

Tech savvy individuals and businesses alike have moved away from traditional Internet browsers such as Microsoft’s Internet Explorer and Apple’s Safari to Google’s Chrome browser. After all, many people enjoy having a simplistic, yet powerful web browser that easily integrates it’s Google Docs tools and Gmail email service. However, users may want to think twice … Read more

We use cookies to gather information about the way you interact with our website, to create reports, and overall help us in improving the website. To learn more about our cookie policy, view our Privacy Policy. By clicking “Accept & Close”, you consent to the use of cookies unless you have disabled them.